Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe
-
Size
281KB
-
MD5
c2416aec2747f03a912b07f0b7aa069a
-
SHA1
251ff482ec6470b0d69a70667fcc51a117bcc67b
-
SHA256
6fbdaa6d5e497f78db70beec806e70ed82ff78c383edea45b7d56f10d3b5a1c6
-
SHA512
1dc4c469220797b78d4c75993d183a16270ab3b575415dd75f56dad6b9401a7d108a5fc3fc1b2d30f5deadf52196c4121b44a1708587320d4ad76959e924e91f
-
SSDEEP
6144:7pcnH1hymlUEAsvK7ke5L3iFPwsj9CnL9R6jbKVCA7W5f1uHVOJ:7pYDycUEAWK7SCsj9kLnCAS9IVW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\C2416A~1.EXE," c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\C2416A~1.EXE" c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\26e44d19 = "b\x1d†òÄÓ\x1b\x1c;\x16s\x1bÛ™|~o\x01S§šŽÃc\x18TtdO—\x04Ä\x05j3§\x19\nüâØkH<W|¦Àþ…D–àFRÄ¥_(¿ñ\vFØ#NÑܦ\x04\x06,\vÍ\x16çÿy£\x1a\fÇç\t\x1a\x0f·*êÏ\x7fîÇ·'o\x1e§¿\x17\x17J·xÇ—¯‚¸–§OÐOúVž'\x17ö\x0f7\x17ùç¸\x1f¿w\x7f\a’W‡g\u008fòçi‰*™úŸYn_ùïI?Ú¯/¯¸n9hRú‡'gׇïW\x18§g™—!?¨ï/\x17)Vg÷&ð\x0e\x0fž§\x0fQð Á¢ùf^’š/—.8\a\u0081\x7f\x1f/v¦/?\x1f™âŠ7ï¯O‡Ö)\x7f¿¹þÿǾgâ\x1f®\x7f\x1f‘‡xh2ÙŸ\x1e?xꆱx’\x17úÑßG" c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\C2416A~1.EXE" c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe Token: SeSecurityPrivilege 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe Token: SeSecurityPrivilege 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe Token: SeSecurityPrivilege 1152 c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c2416aec2747f03a912b07f0b7aa069a_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152